General
-
Target
Open AI Sora Vesion 5.42.zip
-
Size
77.8MB
-
Sample
240724-mpxqcavdrf
-
MD5
772dab1124533314eb796d7a7f0fe8f8
-
SHA1
d686e643fb67e9811cbb13be9d369d202f4a3e5a
-
SHA256
ef868cd1ae46702cd6ac9eb422d4c0b788e68127b7017c6c29ba928c54fc1d8e
-
SHA512
65dde6003953065256cb8264bac98711e03f36f60c9430bdefa04872af4843c65de29273614317ed5c49ad132fa5283d7b52ce4ecbcbd6f83fd2bf6e345cdc0b
-
SSDEEP
1572864:qLYpfkGv/a5y4jBsx/d8aUl9/GKPCo0/fR2HpRnLkSleMdmBisq8x1IxOh:qLQMIa5y4GrxUltkfRCLkSEBqAAOh
Behavioral task
behavioral1
Sample
Open AI Sora Vesion 5.42.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Open AI Sora Vesion 5.42.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Open AI Sora Vesion 5.42.exe
-
Size
157.9MB
-
MD5
167af794837fe9de07ee83acdb74343e
-
SHA1
a3f718d502a0f9e8382d12da9704433b96ea53ed
-
SHA256
06c81d76f89cd374efcf4140b1f8239f30a89b1132608c3696e64199c9d9bd0c
-
SHA512
8e78779a4d43604e705335c45569137ddc0b8b5448d15c44c1bb0fae59c95457dfa896bb3671aec79a0082f104ffa61182453218f759669320b9cba909c0d588
-
SSDEEP
1572864:FHMlnmXXHfarJ2MH6rd07/eGpQvyLxCi70QzyhpPc2qfF4SagVnhqODQA86:NInmXXHfatH6dg/eiZzwJgFo
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1